Author:
Islam Amanul,Por Lip Yee,Othman Fazidah,Ku Chin Soon
Reference28 articles.
1. Por L. Y. and Lim X. T.: Issues, threats and future trend for GSP. in Proceedings of The 7th WSEAS International Conference on Applied Computer & Applied Computational Science, Hangzhou, China, 627–633 (2008)
2. Ho, P. F., Kam, Y. H. S., Wee, M. C., Chong, Y. N., Por, L. Y.: Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects’ Information. The Scientific World Journal, (2014)
3. Por, L.Y., Ku, C.S., Islam, A., Ang, T.F.: Graphical password: Prevent shoulder-surfing at-tack using digraph substitution rules. The Frontiers of Computer Science, Accepted (2016)
4. Blonder, G. E.: ``Graphical Passwords’’, United States Patent 5559961, Lucent Technologies, Inc. (Murray Hill, NJ), (1996)
5. Biddle, R., Chiasson, S., Van Oorschot, P. C.: Graphical passwords: Learning from the first twelve years. ACM Computing Surveys (CSUR), 44(4), 19 (2012)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献